George, a reputed ethical hacker and penetration testing consultant, was hired by FNB Services, a startup financial services company, to audit the security of their web applications. During his investigation, George discovered that the company’s website is vulnerable to blind SQL injection attacks. George entered a custom SQL query in a form located on the vulnerable page which resulted in a back-end SQL query similar to the one given below: http://fnb.com/forms/?id=1+AND+555=if(ord(mid((select+pass from+us
A. George is searching for the first character of all the table entries
B. George is searching for the second character of the first table entry
C. George is searching for the first character of the second table entry
D. George is searching for the first character of the first table entry